Exam 3: Basic Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is Elliptic curve cryptography?

Free
(Essay)
4.9/5
(32)
Correct Answer:
Verified

Elliptic curve cryptography (ECC)was first proposed in the mid-1980s.Instead of using large prime numbers as with RSA,elliptic curve cryptography uses sloping curves.An elliptic curve is a function drawn on an X-Y axis as a gently curved line.By adding the values of two points on the curve,a third point on the curve can be derived,of which the inverse is used.

What is the U.S.federal government standard for digital signatures?

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

D

One of the first popular symmetric cryptography algorithms was RSA.

Free
(True/False)
4.7/5
(37)
Correct Answer:
Verified

False

In information technology,non-repudiation is the process of proving that a user performed an action.

(True/False)
4.8/5
(33)

In which type of encryption is the same key used to encrypt and decrypt data?

(Multiple Choice)
4.7/5
(38)

What technology uses a chip on the motherboard of the computer to provide cryptographic services?

(Multiple Choice)
4.7/5
(35)

What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?

(Multiple Choice)
4.8/5
(35)

What is the Advanced Encryption Standard (AES)?

(Essay)
4.8/5
(31)

In cryptography,which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

(Multiple Choice)
4.7/5
(35)

Obfuscation is making something well known or clear.

(True/False)
4.8/5
(31)

What characteristics are needed to consider a hashing algorithm secure?

(Essay)
4.8/5
(31)

A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.

(True/False)
4.7/5
(36)

Which type of cryptographic algorithm takes an input string of any length,and returns a string of any requested variable length?

(Multiple Choice)
4.9/5
(28)

The SHA-1 hashing algorithm creates a digest that is how many bits in length?

(Multiple Choice)
4.9/5
(33)

Which hash algorithm's primary design feature is two different and independent parallel chains of computation,the results of which are then combined at the end of the process?

(Multiple Choice)
4.9/5
(40)

The simplest type of stream cipher,one in which one letter or character is exchanged for another,is known as what?

(Multiple Choice)
4.8/5
(28)

What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?

(Multiple Choice)
4.8/5
(40)

What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?

(Multiple Choice)
4.9/5
(36)

Which standard was approved by NIST in late 2000 as a replacement for DES?

(Multiple Choice)
4.9/5
(35)

Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.

(True/False)
4.9/5
(37)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)